Results 41 to 50 of about 239,789 (239)
Intrusion Detection Systems (IDS) face major challenges in network security, notably the need to combine a high detection rate with reliable performance.
Sow Thierno Hamidou, Adda Mehdi
doaj +1 more source
A proposed case for the cloud software engineering in security [PDF]
This paper presents Cloud Software Engineering in Security (CSES) proposal that combines the benefits from each of good software engineering process and security.
Chang, V, Ramachandran, M
core
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD [PDF]
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect ...
DELLI PRISCOLI, Francesco +6 more
core +1 more source
An epi‐intraneural interface is developed through in silico optimization and a novel tridimensional microfabrication pipeline. The device integrates penetrating and epineural contacts on a flexible substrate. Mechanical, electrochemical, and in vivo testing in rat and pig reveal robust implantation, low‐threshold activation, and site‐dependent ...
Federico Ciotti +14 more
wiley +1 more source
Buffer or Enabler? The Effect of Financial Slack on R&D Investment in Different Environments
Prior studies have shown mixed findings on the role of financial slack. This study examines how environmental factors such as munificence, dynamism, and complexity moderate the relationship between financial slack and innovation activity. Using data from
Hye Kyung Yu, Minji Kim, Tohyun Kim
doaj +1 more source
Bio‐Inspired Molecular Events in Poly(Ionic Liquids)
Originating from dipolar and polar inter‐ and intra‐chain interactions of the building blocks, the topologies and morphologies of poly(ionic liquids) (PIL) govern their nano‐ and micro‐processibility. Modulating the interactions of cation‐anion pairs with aliphatic dipolar components enables the tunability of properties, facilitated by “bottom‐up ...
Jiahui Liu, Marek W. Urban
wiley +1 more source
In recent years, concepts and components of information technology (IT) have made their way into the shop floor, today better known as operational technology (OT).
Mukund Bhole +2 more
doaj +1 more source
Gender inequality is a significant concern in many cultures, as women face significant barriers to asset acquisition particularly land ownership and control. Land acquisition and land tenure security are complex issues that affect various cultural groups differently, leading to disparities in access and ownership especially when superimposed with other
Ogundare, Oluwatosin, Njualem, Lewis
openaire +2 more sources
Do GANs leave artificial fingerprints?
In the last few years, generative adversarial networks (GAN) have shown tremendous potential for a number of applications in computer vision and related fields.
Gragnaniello, Diego +3 more
core +1 more source
Coagulative granular hydrogels are composed of packed thrombin‐functionalized microgels that catalyze the conversion of fibrinogen into a secondary fibrin network, filling the interstitial voids. This bio‐inspired approach stabilizes the biomaterial to match the robustness of bulk hydrogels without compromising injectability, mimicking the initial ...
Zhipeng Deng +16 more
wiley +1 more source

